Skype is blaming last week's two-day outage on millions of Windows machines restarting after the installation of Microsoft's security patches.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is an outspoken and controversial author and journalist; she contributes to ZDNet, CNET, CBS News and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
So, Skype just came back up for me after 24 hours of being offline.Then this sudden error message while I was in the middle of a work-related conversation (Skype is my primary phone service for work):With all the speculation swirling that this outage might be linked to a malicious hacking attack, I'm curious about whether this is a random bug linked to network problems or something more sinister.
Sourcefire's acquisition of the ClamAV project -- a deal that includes trademarks and copyrights of the popular open-source anti-virus toolkit -- has raised eyebrows among industry watchers worried about the future of free security products.
The Gentoo Project has removed a server hosting several sites and services after the discovery of a potentially serious command injection vulnerability.
Exploit code for a potentially serious vulnerability in Yahoo Messenger has been posted on the Internet, putting millions of computer users at risk of code execution attacks.
According to a notice in the Ubuntu weekly newsletter, 5 of the 8 servers that are loco hosted had to be shut down after an investigation showed a variety of security problems.
Instead of designing the security software to run on Microsoft's Windows or another operating system, Symantec and Intel are building it so it can directly interact with the Intel chips.
The cumulative Internet Explorer update headlines a bumper batch of nine bulletins that contains fixes for 14 documented software vulnerabilities.
When the security software installed on your system exposes you to code execution attacks, can you really trust them?